Verified Test Bank – Ch.8 – Terrorism And Evolving Security - Exam Pack | International Relations 3e Shiraev by Eric Shiraev. DOCX document preview.
CHAPTER 8: TERRORISM AND EVOLVING SECURITY CHALLENGES
Test Questions
Multiple-Choice Questions
Question type: factual
Section 8.1 Terrorism and Counterterrorism
1.Of the following terrorist groups, which orchestrated the 9/11 attacks?
- ISIS.
- Al-Qaeda.
- Taliban.
- Hamas.
Question type: conceptual
Section 8.1 Terrorism and Counterterrorism
2. International terrorism rejects ______ and defies _______.
- International law . . . international organizations.
- Domestic law . . . domestic institutions.
- Sharia law . . . the Koran.
- Sharia law . . . international organizations.
Question type: conceptual
Section 8.1 Terrorism and Counterterrorism
3. States and international organizations develop long-term policies and specific short-term measures about terrorism that BEST are called
- Guerrilla warfare.
- Fight Terror campaign.
- Geostrategy.
- Counterterrorism.
Question type: applied
Section 8.1 Terrorism and Counterterrorism
4. Which country did the United States invade after the 9/11 terrorist attacks?
- Iraq.
- Afghanistan.
- Saudi Arabia.
- Libya.
Question type: conceptual
Section 8.1 Terrorism and Counterterrorism
5. According to international law, individuals suspected of terrorist acts are subject to _____, or removal from one country to another to face charges.
- Extradition.
- Extraordinary rendition.
- Immunity.
- Command and control.
Question type: applied
Section 8.1 Terrorism and Counterterrorism
6. The 1972 Munich Olympics terrorist incident could BEST be referred to as
- State terror.
- International terrorism.
- Domestic terrorism.
- Guerilla warfare.
Question type: factual
Section 8.1 Terrorism and Counterterrorism
7. What terrorist group attacked the 1972 Olympic Games in Munich?
- Global jihad.
- ISIS.
- IRA.
- Palestinian militants.
Question type: conceptual
Section 8.1 Terrorism and Counterterrorism
8. Which of the following statements is NOT true?
- Future terrorist attacks may involve weapons of mass destruction.
- Terrorist groups use political violence or threats of violence to influence governments or key decision makers.
- Terrorist groups are often relatively easy to infiltrate.
- Terrorists understand that they cannot defeat states and international coalitions in an open battle.
Question type: conceptual
Section 8.1 Terrorism and Counterterrorism
9. Terrorists largely rely on ____ to compel others to comply with demands.
- Coercion and extortion.
- Persuasion and force.
- Ultimatums and reparations.
- Conversion and logic.
Question type: conceptual
Section 8.1 Terrorism and Counterterrorism
10. The logic of terrorism is characterized by all of the following, EXCEPT
- The argument for collective responsibility.
- The justified act of retaliation.
- The method of last resort.
- The self-fulfilling prophecy.
Question type: conceptual
Section 8.1 Terrorism and Counterterrorism
11. A caliphate is led by a ________ ruler.
a. Hereditary.
b. Socialist.
c. Anarchist.
d. Muslim.
Question type: factual
Section 8.1 Terrorism and Counterterrorism
12. Which group sought to create an Islamic state in Iraq and Syria?
a. Al-Qaeda.
b. Red Army Faction.
c. ISIS.
d. Palestinian Liberation Organization.
Question type: applied
Section 8.1 Terrorism and Counterterrorism
13. One of the groups below is NOT considered a terrorist group of the earlier waves.
- Al-Qaeda.
- Red Army Faction.
- PKK.
- Shining Path.
Question type: applied
Section 8.1 Terrorism and Counterterrorism
14. Which of the groups below are NOT religion based?
- Shining Path.
- Al-Qaeda.
- Hamas.
- Hezbollah.
Question type: applied
Section 8.1 Terrorism and Counterterrorism
15. Which of the following groups has NOT been defeated or largely subdued?
- IRA.
- RAF.
- Red Brigades.
- Hamas.
Question type: factual
Section 8.1 Terrorism and Counterterrorism
16. ______ is a Shiite group operating from Lebanon that targets Israel and its supporters.
- Hezbollah.
- Hamas.
- Al-Qaeda.
- RAF.
Question type: applied
Section 8.1 Terrorism and Counterterrorism
17. The United States government is likely overall MOST concerned with cyberattacks from which of the following countries?
a. China and Russia.
b. South Korea and Japan.
c. Great Britain and France.
d. Mexico and Brazil.
Question type: conceptual
Section 8.1 Terrorism and Counterterrorism
18. In 2009, Great Britain’s Joint Intelligence Committee warned that phone components built in this country could disrupt Britain’s power and food supplies:
a. Russia.
b. South Korea.
c. The United States.
d. China.
Question type: conceptual
Section 8.2 Traditional Views of Evolving Security Threats
19. According to realism, in 1914 the Austrian government in Vienna _____ action to punish the Serbs.
- Should have taken swift.
- Should have taken no.
- Should have waited before taking.
- Should have avoided any.
Question type: conceptual
Section 8.2 Traditional Views of Evolving Security Threats
20. By disrupting the ________ or posing asymmetrical threats, terrorism brings _____, which leads to international tensions.
- Power balance . . . instability.
- Power games . . . chaos.
- Structural balance . . . confidence.
- Status quo . . . stability.
Question type: conceptual
Section 8.2 Traditional Views of Evolving Security Threats
21. The 1914 Sarajevo assassination caused
- A shift in the global power balance caused by nonstate actors.
- A solidifying in global power structures that helped Austria and Germany mobilize.
- A traumatic power shift orchestrated by the Serbian state.
- A chain reaction that led Russia to invade Germany.
Question type: conceptual
Section 8.2 Traditional Views of Evolving Security Threats
22. Realist strategies of counterterrorism do NOT include
- Monitoring.
- Prevention.
- Preemption.
- Education.
Question type: conceptual
Section 8.2 Traditional Views of Evolving Security Threats
23. According to the liberal perspective, actions against terrorist groups
- Should be conducted in secret.
- Should be strictly legitimate.
- Should be conducted only in the terrorists’ home country.
- Should be put to a vote of the people before they are carried out.
Question type: conceptual
Section 8.2 Traditional Views of Evolving Security Threats
24. In the view of liberalists, illegal violent actions should not cause illegal counteractions, a view termed
- The criminalization of terrorism.
- The decriminalization of terrorism.
- The terrorist paradigm.
- The terrorist law.
Question type: conceptual
Section 8.2 Traditional Views of Evolving Security Threats
25. Which of the following statements about liberalism is NOT true?
- States should be free to use surveillance and prevention to combat terrorism.
- Terrorism is a complex social and political phenomenon with interrelated causes.
- People turn to terrorism for a reason, even if it appears to be a distorted one.
- Terrorists recruit their support by exploiting acute social and political problems.
Question type: applied
Section 8.3 Alternative Views of Evolving Security Threats
26. As applied to explaining the causes of terrorism, constructivism has the most in common with
- Liberalism.
- Realism.
- Neorealism.
- Marxism.
Question type: factual
Section 8.3 Alternative Views of Evolving Security Threats
27. Constructivists argue that there are three fundamental pillars on which terrorism is built; this is NOT one of them:
- Terrorists generally believe that some profound injustice has occurred.
- Terrorists see their targets as solely responsible for this injustice.
- Terrorists believe that Islam should prevail and stop global injustice.
- Terrorists believe that only violence can direct attention to the injustice.
Question type: factual
Section 8.3 Alternative Views of Evolving Security Threats
28. The conflict in Northern Ireland was essentially a conflict between
- Rich and poor.
- The Irish and the English.
- Protestants and Catholics.
- Socialists and capitalists.
Question type: applied
Section 8.3 Alternative Views of Evolving Security Threats
29. The Basque separatist movement demands its independence from which country?
- Italy.
- Spain.
- Portugal.
- Greece.
Question type: applied
Section 8.3 Alternative Views of Evolving Security Threats
30. The abbreviation ETA stands for which movement?
- Irish separatist movement.
- Greek separatist movement.
- Basque separatist movement.
- French separatist movement.
Question type: applied
Section 8.3 Alternative Views of Evolving Security Threats
31. Why did terrorism NOT take root in Japan and Germany under Allied occupation following World War II?
- Potential terrorists had no access to bomb-making materials.
- The United States imposed draconian military law.
- Potential terrorists had difficulty communicating with each other.
- Defeat in war ended nearly all support for extreme nationalism.
Question type: factual
Section 8.3 Alternative Views of Evolving Security Threats
32. Which country has been primarily responsible for funding Wahhabism and Salafism, two radical forms of Islam?
- Saudi Arabia.
- Iran.
- Iraq.
- Egypt.
Question type: factual
Section 8.3 Alternative Views of Evolving Security Threats
33. Wars in these two countries were important recruiting tools for Islamic fundamentalist terrorists:
- Spain and Argentina.
- Turkey and Russia.
- Vietnam and Korea.
- Iraq and Afghanistan.
Question type: factual
Section 8.4 Context and Applications
34. Research has shown that although extreme violence such as suicide attacks seems ____, terrorists believe that they act with complete ____.
- Irrational . . . rationality.
- Rational . . . irrationality.
- Somewhat rational . . . indifference.
- Less irrational . . . compassion.
Question type: factual
Section 8.4 Context and Applications
35. Which of the following statements about terrorists is TRUE?
- They tend to be younger.
- They are about evenly divided between males and females.
- They often show strong signs of mental illness.
- They often have high levels of self-esteem.
Question type: factual
Section 8.4 Context and Applications
36. From a psychological perspective, terrorists usually
- Have high levels of self-esteem.
- Have low levels of anger.
- Are relatively immune to group pressures.
- Have a heightened sense of insecurity.
Question type: factual
Section 8.4 Context and Applications
37. The price tag for U.S. counterterrorism activities lies between
- $3 and $5 trillion.
- $200 and $300 million.
- $55 and $63 billion.
- $150 and $152 trillion.
Question type: factual
Section 8.4 Context and Applications
38. The Muslim Brotherhood won power elections in this country, but was later overthrown by the military:
- Algeria.
- Egypt.
- Syria.
- Iraq.
Question type: factual
Section 8.4 Context and Applications
39. Which of the following groups fought in Italy in the 1970s?
- Red Brigades.
- Red Army Faction.
- ETA.
- IRA.
Question type: conceptual
Section 8.4 Context and Applications
40. Guerrilla warfare is BEST described as
- Political violence by identifiable, irregular combat units, usually to seize state power, win autonomy, or found new states.
- Random acts of violence by specific, radical fighter groups to overthrow multinational corporations.
- Freedom fighters that combat in the name of Allah mostly in Latin America and Asia.
- Separatist groups that fight for more political rights generally against other power-striving paramilitary combat units.
Question type: conceptual
Section 8.4 Context and Applications
41. Which of the following statements about terrorism and the international system is TRUE?
- The international system is now quite resilient, so terrorists cannot trigger a global war.
- There is currently no concert of great powers to counteract terrorist activities.
- Many states are now safe havens for terrorists and will remain so.
- Violent ideologies outside of militant Islamic fundamentalism are an increasing threat to states and the international system.
Question type: factual
Section 8.4 Context and Applications
42. Which wave of terrorism occurred first?
- Anarchism.
- Anticolonialism.
- Radical Communism.
- Religious.
Question type: factual
Section 8.4 Context and Applications
43. Which wave of terrorism occurred second?
- Anarchism.
- Anticolonialism.
- Radical Communism.
- Religious.
Question type: factual
Section 8.4 Context and Applications
44. Which of the following is NOT a feature of the new terrorism wave?
- Terrorists have increasingly resorted to attacks on civilian populations to achieve greater carnage and more headlines.
- Terrorism’s operations have become global.
- Terror cells have one central point of command.
- Terrorists more often operate in small, loosely connected groups.
Question type: factual
Section 8.4 Context and Applications
45. ______is the glorification of personal destruction in the name of a particular goal.
- Martyrdom.
- Suicide bombing.
- Running amok.
- Metamorphosis.
Question type: factual
Section 8.4 Context and Applications
46. Osama bin Laden was born into a wealthy family from
- Jordan.
- Egypt.
- Saudi Arabia.
- Tunisia.
Question type: factual
Section 8.4 Context and Applications
47. As an adolescent, Osama bin Laden _____ strong fundamentalist views of Islam.
- Accepted.
- Refused.
- Questioned.
- Was indifferent to.
Question type: applied
Section 8.4 Context and Applications
48. An Afghani suicide bomber attacking a U.S. target engages in
- Sharia.
- Jihad.
- Counterterrorism.
- Guerrilla warfare.
Question type: applied
Section 8.4 Context and Applications
49. The Soviet invasion of Afghanistan in 1979 brought ______ to the battlefield to fight for Islam.
- Bin Laden.
- Rambo.
- Qaddafi.
- Che Guevara.
Question type: applied
Section 8.4 Context and Applications
50. Bin Laden referred to Great Satan, indicating
- The Soviet Union.
- The United States.
- Afghanistan.
- Pakistan.
Question type: factual
Section 8.4 Context and Applications
51. For al-Qaeda, the two main enemies are
- Iran and Afghanistan.
- Christianity and the United States.
- Europe and international banking.
- Western civilization and Israel.
Short-Answer Questions
1. Define terrorism.
2. What does the term counterterrorism stand for?
3. Name and explain three forms of terrorism.
4. What is cyberterrorism and why is it a security threat?
5. Describe and define the logic of terrorism.
6. Name and explain some ideological foundations of terrorism.
7. What is cyberterrorism?
8. List key tools of cyberwarfare.
9. What does RAF stand for and what were its goals?
10. What is al-Qaeda?
11. Explain the term Sharia law.
12. What do we understand by asymmetrical threats?
13. What are the three pillars of terrorism according to constructivists?
14. What is the new terrorism?
15. Who was Osama bin Laden and why was he important for international relations?
16. What is the Muslim Brotherhood?
17. Define and explain the term jihad.
18. What happened at the Olympic Games in Munich in 1972?
19. Explain the term Red Brigades.
20. What is political Islam?
21. What are preemptive strategies?
22. Define the term homeland security.
23. What is a caliphate and why is the term important today?
24. What are the key characteristics of guerrilla warfare?
25. What are preemptive policies?
Essay Questions
1. Discuss the pros and cons of government strategies to define and label terrorist groups in society.
2. Identify and analyze a constructivist approach to combating international terrorism.
3. Have realist approaches to fight international terrorism been successful? Discuss.
4. Has the nature of terrorism changed over time? Draw on specific examples to support your claims.
5. Using an empirical example of your choice, discuss the concept of asymmetrical threats.
6. Analyze the liberalist view of terrorism and discuss the value of its counterterrorism strategies.
7. Compare and contrast realist, liberalist, and constructivist approaches to counterterrorism.
8. Use the state policies context to discuss why different types of states are more vulnerable to terrorism and how different types of states respond to terrorism.
9. Write an essay about Osama bin Laden, including discussion and analysis of what set him on the path to terrorism.
10. Explain and discuss the global waves of terrorism over time, using specific empirical examples of your choice.
11. Write an essay on cyberterrorism. What are the main tools that cyberterrorists can use, and what would they try to achieve?
12. How do the realist and liberal perspectives differ on the regulation and potential use of artificial intelligence warfare?